Sciweavers

3918 search results - page 649 / 784
» Probabilistic model of triangulation
Sort
View
WACV
2008
IEEE
14 years 4 months ago
Mosaicfaces: a discrete representation for face recognition
Most face recognition algorithms use a “distancebased” approach: gallery and probe images are projected into a low dimensional feature space and decisions about matching are b...
Jania Aghajanian, Simon J. D. Prince
DATE
2007
IEEE
154views Hardware» more  DATE 2007»
14 years 4 months ago
Soft error rate analysis for sequential circuits
Due to reduction in device feature size and supply voltage, the sensitivity to radiation induced transient faults (soft errors) of digital systems increases dramatically. Intensiv...
Natasa Miskov-Zivanov, Diana Marculescu
ICDM
2007
IEEE
187views Data Mining» more  ICDM 2007»
14 years 4 months ago
Statistical Learning Algorithm for Tree Similarity
Tree edit distance is one of the most frequently used distance measures for comparing trees. When using the tree edit distance, we need to determine the cost of each operation, bu...
Atsuhiro Takasu, Daiji Fukagawa, Tatsuya Akutsu
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
14 years 4 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
14 years 4 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada